Abstract:Wireless Sensor Networks are gaining popularity in various fields and areas. But these nodes are vulnerable as they are open networks and easily accessible. The major challenge is to have a secure data transmission between the nodes. To establish a secure transmission, we require a security scheme like a cryptographic algorithm, but this also requires a secure key distribution between nodes. The WSN's have constraints like limited area, power and memory which restrict all the categories of cryptographic algori… Show more
“…This research claims to evaluate in terms of key generation time and data packet size. The article [82] discuss new approach, which is similar to ECC. This scheme claims to provide secure key and data transmission between nodes.…”
Section: A Ecc Based Security Approaches In Wsnmentioning
“…This research claims to evaluate in terms of key generation time and data packet size. The article [82] discuss new approach, which is similar to ECC. This scheme claims to provide secure key and data transmission between nodes.…”
Section: A Ecc Based Security Approaches In Wsnmentioning
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.